IEEE Transactions on Software Engineering - Special issue on computer security and privacy
A survey of intrusion detection techniques
Computers and Security
A Methodology for Testing Intrusion Detection Systems
IEEE Transactions on Software Engineering
Testing and evaluating computer intrusion detection systems
Communications of the ACM
Bro: a system for detecting network intruders in real-time
Computer Networks: The International Journal of Computer and Telecommunications Networking
Intrusion detection
The base-rate fallacy and the difficulty of intrusion detection
ACM Transactions on Information and System Security (TISSEC)
A fast string searching algorithm
Communications of the ACM
The 1999 DARPA off-line intrusion detection evaluation
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
Evaluation of Intrusion Detectors: A Decision Theory Approach
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Snort - Lightweight Intrusion Detection for Networks
LISA '99 Proceedings of the 13th USENIX conference on System administration
Measuring intrusion detection capability: an information-theoretic approach
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Automatic Evaluation of Intrusion Detection Systems
ACSAC '06 Proceedings of the 22nd Annual Computer Security Applications Conference
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
SigFree: A Signature-Free Buffer Overflow Attack Blocker
IEEE Transactions on Dependable and Secure Computing
Detecting Intrusions through System Call Sequence and Argument Analysis
IEEE Transactions on Dependable and Secure Computing
Anomalous payload-based worm detection and signature generation
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Anagram: a content anomaly detector resistant to mimicry attack
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems
WAINA '12 Proceedings of the 2012 26th International Conference on Advanced Information Networking and Applications Workshops
IEEE Network: The Magazine of Global Internetworking
Review: A survey of intrusion detection techniques in Cloud
Journal of Network and Computer Applications
Review: Intrusion detection system: A comprehensive review
Journal of Network and Computer Applications
Hi-index | 0.00 |
Due to the complexity of intrusion detection systems and their application in security architectures, there is a need to objectively assess intrusion detection systems in the perspective of system and network administration in order to select a right product which is a good fit to a specific design. In this research, we have developed a methodology to evaluate intrusion detection systems in a simulated environment. The environment is built with a combination of physical and virtual machines. Network traffic is simulated with baseline activities, which is characterized with web browsing and normal user activities, benchmark and actual intrusion attacks. Different tools are employed to measure CPU load, memory need, bandwidth constraint and computer memory input/output. Results show considerable differences among tested intrusion detection systems.